5. Under this registry path, you will see subkeys named explorer.exe and iexplorer.exe.These keys must be pointing to files created by the virus that have been removed (virus/spyware); explorer32dbg.exe and iexplore_dbg.exe.